introducing co3's security incident response module

13
Automated Incident Response Introducing Co3’s Security Incident Response Module

Upload: co3-systems

Post on 18-Nov-2014

574 views

Category:

Technology


1 download

DESCRIPTION

In response to customer demand, we recently added a security incident response module (S-IR) to Co3. This expands the scope of our solution beyond privacy breaches, to include all types of security incidents like system intrusions, malware outbreaks, and DDoS attacks. As a result Co3 can now automate incident response for all kinds of events, including of course, those that impact personally identifiable information. As you know, we don't typically do product-oriented webinars. But since many of you have expressed interest in learning more about the S-IR module we are going to give it a try. This webinar will demonstrate the new release of the Co3 platform, including the S-IR module. Privacy professionals will get a hot-off-the-presses look at this major update to our solution and will see how the S-IR module allows them to work more effectively with their counterparts in IT. Security professionals will get an introduction to a game-changing security product which Network World recently named, "One of the hottest products at RSA."

TRANSCRIPT

Page 1: Introducing Co3's Security Incident Response Module

Automated Incident Response

Introducing Co3’s Security Incident

Response Module

Page 2: Introducing Co3's Security Incident Response Module

Page 2

Agenda

• Introductions

• System Overview

• Demo

• Overall release highlights

• S-IR module

• Q&A

Page 3: Introducing Co3's Security Incident Response Module

Page 3

Automating IR – Based On ER Standards

Prepare

Improve Organizational

Readiness

• Invite team members

• Fine-tune response policies

and procedures

• Run simulations

(firedrills / table tops)

Report

Document Results

& Improve Performance

• Generate reports for management,

auditors, and authorities

• Document results

• Conduct post-mortem

• Update policies and procedures

• Track evidence

• Evaluate historical performance

Assess

Identify and Evaluate

Incidents

• Engage appropriate team members

• Evaluate precursors and indicators

• Track incidents, maintain logbook

• Automatically prioritize activities

based on criticality

• Log evidence

• Generate assessment summaries

Manage

Contain, Eradicate,

and Recover

• Generate real-time IR plan

• Coordinate team response

• Choose appropriate containment

strategy

• Isolate and remediate cause

• Instruct evidence gathering and

handling

Page 4: Introducing Co3's Security Incident Response Module

Page 4

Co3 Advisory Board

Dr. Larry Ponemon

Founder & Chairman, Ponemon Institute

Gerhard Eschelbeck

CTO & SVP Sophos, CTO Webroot, CTO Qualys

Stuart McClure

CEO Cylance, CTO McAfee, COO Foundstone

Andrew Serwin

One of world’s leading Privacy and

Security Attorneys

Chris McLellan

CISO Hubspot, CSO Fidelity, CISO State Street

Joseph DeSalvo

CISO Iron Mountain, FBI Special Officer

Eugene Kuznetsov

Founder DataPower, Abine

Samir Kapuria

VP Business Strategy and Security Intelligence

Symantec

Bruce Schneier

Internationally renowned security expert,

CTO BT/Counterpane

Andrew Jaquith

CTO SilverSky (ePerimeter Security), Forrester

Research

Patricia Titus

CISO Symantec, Unisys

Page 5: Introducing Co3's Security Incident Response Module

Page 5

Co3 System Modules

“One of the hottest products at RSA…”

NETWORK WORLD – FEBRUARY 2013

“…an invaluable weapon when responding to

security incidents.”

GOVERNMENT COMPUTER NEWS – APRIL 2013

“Co3 makes the process of planning for a

nightmare scenario as painless as possible,

making it an Editors' Choice.”

PC Magazine – May 2013

• Regulations knowledgebase

• Instant IR plans

• Assessments / PIAs

• Simulations / firedrills

“Co3…defines what software packages for

privacy look like.”

GARTNER

Co3 “is comprehensive, user friendly, and

very well designed.”

PONEMON INSTITUTE

• Best practices knowledgebase

• Dashboards, reports, and

analytics

• Collaboration features

Page 6: Introducing Co3's Security Incident Response Module

Page 6

System Overview

SSAE-16 SOC2 certified

hosting facility

Event-Entry Wizard

Knowledgebase

Live IR Plans

Reporting

Page 7: Introducing Co3's Security Incident Response Module

Page 7

Best-of-Breed IR Plan Construction

Regulatory Requirements HIPAA / HITECH, PCI-DSS, State / Region Breach Disclosure Laws, SEC / FINRA, GLB, etc.

Industry Standard Frameworks NIST, CERT, SANS, etc. – apply to all incident types

Organizational Standards / Best Practices / Requirements Custom tasks, like contractual requirements, that are unique to the organization and apply to all incidents

Organizational Best-Practices & Requirements / Incident Type

Custom tasks that are unique to this type of incident

Industry Best-Practices / Incident Type Recommended by industry groups such as STIGs,

FFIEC, COSO

Vendor Best Practices / Intelligence Feeds 3rd party product-specific tasks / 3rd party intelligence feeds

Community Recommendations / Intelligence Anonymized correlation with similar incidents / response plans

Co3 Systems Inc. – Proprietary and Confidential 7

Page 8: Introducing Co3's Security Incident Response Module

POLL #1

Page 9: Introducing Co3's Security Incident Response Module

DEMO – PT 1

Page 10: Introducing Co3's Security Incident Response Module

POLL #2

Page 11: Introducing Co3's Security Incident Response Module

DEMO – PT 2

Page 12: Introducing Co3's Security Incident Response Module

QUESTIONS

Page 13: Introducing Co3's Security Incident Response Module

One Alewife Center, Suite 450

Cambridge, MA 02140

PHONE 617.206.3900

WWW.CO3SYS.COM

“One of the hottest products at RSA…”

NETWORK WORLD – FEBRUARY 2013

“…an invaluable weapon when

responding to security incidents.”

GOVERNMENT COMPUTER NEWS – APRIL 2013

“Co3 makes the process of planning for a

nightmare scenario as painless as

possible, making it an Editors' Choice.”

PC Magazine – May 2013